Home

Description

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, _validate_collection_access() checks the user-memory-* and file-* collection name prefixes but does not check knowledge base collections, which use raw UUIDs as collection names. Any authenticated user who knows a private knowledge base UUID can read its content through the retrieval query endpoints, even though the knowledge API correctly denies that user access. The same gap affects the retrieval write endpoints (/process/text, /process/file, /process/files/batch, /process/web, /process/youtube), allowing an attacker to inject content into or overwrite another user's knowledge base. This vulnerability is fixed in 0.9.5.

PUBLISHED Reserved 2026-05-12 | Published 2026-05-15 | Updated 2026-05-19 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

< 0.9.5
affected

References

github.com/...-webui/security/advisories/GHSA-4g37-7p2c-38r9 exploit

github.com/...-webui/security/advisories/GHSA-4g37-7p2c-38r9

github.com/open-webui/open-webui/pull/22109

github.com/open-webui/open-webui/releases/tag/v0.9.5

cve.org (CVE-2026-45398)

nvd.nist.gov (CVE-2026-45398)

Download JSON